default search action
Toyoo Takata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j24]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Probabilistic computation offloading for mobile edge computing in dynamic network environment. Internet Things 11: 100225 (2020) - [c34]Tetsuya Hirakawa, Toyoo Takata:
The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS. NBiS 2020: 225-237
2010 – 2019
- 2019
- [c33]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
A Probabilistic Offloading Approach in Mobile Edge Computing. BWCCA 2019: 266-278 - [c32]Toyoo Takata, Kanayo Ogura:
Confront Phishing Attacks - from a Perspective of Security Education. iCAST 2019: 1-4 - 2018
- [j23]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Incentive mechanisms for promoting D2D communications in cellular networks. Int. J. Space Based Situated Comput. 8(1): 1-8 (2018) - [j22]Eiichiro Kodama, Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Construction and maintenance of k-hop CDS in MANET with two classes of mobile terminals. Int. J. Space Based Situated Comput. 8(2): 70-79 (2018) - [c31]Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
An Analysis of a Defence Method against Slow HTTP DoS Attack. ISITA 2018: 316-320 - 2017
- [j21]Yasushi Hosokawa, Daiki Urata, Akio Doi, Toyoo Takata, Yoshihiko Abe:
The motion capturing of female divers under water and the trial production of motion viewers for developing a virtual diving experience learning system. Artif. Life Robotics 22(3): 346-356 (2017) - [c30]Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Construction and Maintenance of K-Hop CDS in Mobile Ad Hoc Networks. AINA 2017: 220-227 - [c29]Bhed Bahadur Bista, Jiahong Wang, Toyoo Takata:
Mechanism for Adopting Device-to-Device Communication in Cellular Networks. NBiS 2017: 306-316 - 2016
- [c28]Hiroya Takahashi, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A user authentication scheme using keystrokes for smartphones while moving. ISITA 2016: 310-314 - [c27]Masaki Narita, Keisuke Kamada, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet. NBiS 2016: 76-83 - [c26]Tetsuya Hirakawa, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Defense Method against Distributed Slow HTTP DoS Attack. NBiS 2016: 152-158 - 2015
- [j20]Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Identifying relations between frequent patterns mined at two collaborative websites. Int. J. Space Based Situated Comput. 5(4): 209-221 (2015) - [c25]Shingo Sasaki, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of QoS-aware Power Saving Scheme for SDN-based Networks. NBiS 2015: 71-77 - 2014
- [c24]Shizuka Sato, Eiichiro Kodama, Jiahong Wang, Toyoo Takata:
An Onomatopoeia-Based Web Music Video Searching System and Its Performance Evaluation. HCI (26) 2014: 246-251 - [c23]Tomoaki Tsuchikawa, Bhed Bahadur Bista, Toyoo Takata:
A proposal of distributed management scheme of content key information for pure P2P networks. ISITA 2014: 241-245 - [c22]Masaki Narita, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata:
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack. NBiS 2014: 271-278 - 2013
- [j19]Nan Meng, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Reducing data leakage possibility resulted from eavesdropping in wireless sensor network. Int. J. Space Based Situated Comput. 3(1): 55-65 (2013) - [j18]Masaki Narita, Bhed Bahadur Bista, Toyoo Takata:
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors. Int. J. Space Based Situated Comput. 3(4): 215-226 (2013) - [c21]Masaki Narita, Bhed Bahadur Bista, Toyoo Takata:
A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports. AINA 2013: 98-105 - [c20]Jiahong Wang, Yuhiro Yonamine, Eiichiro Kodama, Toyoo Takata:
A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks. ICPADS 2013: 357-364 - 2012
- [c19]Takashi Iokawa, Yuhiro Yonamine, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Supporting Communication in Time of Disaster. BWCCA 2012: 379-384 - [c18]Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, Toyoo Takata:
A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS. NBiS 2012: 261-267 - 2011
- [c17]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace. AINA Workshops 2011: 341-348 - [c16]Nan Meng, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
Enhancing Sensor Network Security by Reducing Radio-Wave Leakage. BWCCA 2011: 339-344 - 2010
- [c15]Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. AINA 2010: 438-445 - [c14]Hirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A user authenticaion scheme using multiple passphrases and its arrangement. ISITA 2010: 554-559
2000 – 2009
- 2009
- [c13]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents. MATES 2009: 91-102 - 2007
- [j17]Jiahong Wang, Yoshiaki Asanuma, Eiichiro Kodama, Toyoo Takata, Jie Li:
Mining Sequential Patterns More Efficiently by Reducing the Cost of Scanning Sequence Databases. Inf. Media Technol. 2(1): 163-177 (2007) - [j16]Shintaro Urabe, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining. Inf. Media Technol. 2(3): 821-834 (2007) - [c12]Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A New Approach to Early Detection of an Unknown Worm. AINA Workshops (1) 2007: 194-198 - [c11]Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. NBiS 2007: 127-136 - [c10]Shintaro Urabe, Jiahong Wang, Eiichiro Kodama, Toyoo Takata:
A high collusion-resistant approach to distributed privacy-preserving data mining. Parallel and Distributed Computing and Networks 2007: 307-312 - 2006
- [j15]Jiahong Wang, Takuya Fukasawa, Shintaro Urabe, Toyoo Takata, Masatoshi Miyazaki:
Mining Frequent Patterns Securely in Distributed System. IEICE Trans. Inf. Syst. 89-D(11): 2739-2747 (2006) - [c9]Jiahong Wang, Yoshiaki Asanuma, Eiichiro Kodama, Toyoo Takata:
A Scalable Sequential Pattern Mining Algorithm. AICCSA 2006: 437-444 - [c8]Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
DoS Packet Filter Using DNS Information. AINA (1) 2006: 116-131 - [c7]Atsumu Watanabe, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
On a Watermarking Scheme for MusicXML. AINA (2) 2006: 894-898 - [c6]Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata:
AWide Area Log Analyzing System Based on Mobile Agents. CIMCA/IAWTIC 2006: 26 - [c5]Takashi Hamma, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks. DEXA Workshops 2006: 66-70 - 2005
- [c4]Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:
Development of Security Scanner with High Portability and Usability. AINA 2005: 407-410 - 2004
- [c3]Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:
Development of Security Scanner with High Usability. AINA (1) 2004: 139-144 - [c2]Takuya Fukasawa, Jiahong Wang, Toyoo Takata, Masatoshi Miyazaki:
An Effective Distributed Privacy-Preserving Data Mining Algorithm. IDEAL 2004: 320-325 - 2003
- [c1]Bhed Bahadur Bista, Goutam Chakraborty, Toyoo Takata:
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing. ICDCS Workshops 2003: 514-518 - 2002
- [j14]Jun Asatani, Kenichi Tomita, Takuya Koumoto, Toyoo Takata, Tadao Kasami:
A Soft-Decision Iterative Decoding Algorithm Using a Top-Down and Recursive Minimum Distance Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(10): 2220-2228 (2002)
1990 – 1999
- 1999
- [j13]Takuya Koumoto, Toyoo Takata, Tadao Kasami, Shu Lin:
A Low-Weight Trellis-Based Iterative Soft-Decision Decoding Algorithm for Binary Linear Block Codes. IEEE Trans. Inf. Theory 45(2): 731-741 (1999) - 1997
- [j12]Tadao Kasami, Toyoo Takata, Kouichi Yamashita, Toru Fujiwara, Shu Lin:
On bit-error probability of a concatenated coding scheme. IEEE Trans. Commun. 45(5): 536-543 (1997) - 1994
- [j11]Jiantian Wu, Shu Lin, Tadao Kasami, Toru Fujiwara, Toyoo Takata:
An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes. IEEE Trans. Commun. 42(234): 813-818 (1994) - [j10]Toyoo Takata, Yuji Yamashita, Toru Fujiwara, Tadao Kasami, Shu Lin:
Suboptimum decoding of decomposable block codes. IEEE Trans. Inf. Theory 40(5): 1392-1405 (1994) - 1993
- [j9]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. IEEE Trans. Inf. Theory 39(1): 242-245 (1993) - [j8]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On complexity of trellis structure of linear block codes. IEEE Trans. Inf. Theory 39(3): 1057-1064 (1993) - [j7]Toyoo Takata, Satoshi Ujita, Tadao Kasami, Shu Lin:
Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis. IEEE Trans. Inf. Theory 39(4): 1204-1218 (1993) - 1991
- [j6]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On linear structure and phase rotation invariant properties of block M-PSK modulation codes. IEEE Trans. Inf. Theory 37(1): 164-167 (1991) - [j5]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On multilevel block modulation codes. IEEE Trans. Inf. Theory 37(4): 965-975 (1991) - 1990
- [j4]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
A concatenated coded modulation scheme for error control. IEEE Trans. Commun. 38(6): 752-763 (1990) - [j3]Toyoo Takata, Toru Fujiwara, Tadao Kasami, Shu Lin:
An error control system with multiple-stage forward error corrections. IEEE Trans. Commun. 38(10): 1799-1809 (1990)
1980 – 1989
- 1988
- [j2]Tadao Kasami, Toru Fujiwara, Toyoo Takata, Shu Lin:
A cascaded coding scheme for error control and its performance analysis. IEEE Trans. Inf. Theory 34(3): 448-462 (1988) - 1986
- [j1]Toru Fujiwara, Toyoo Takata, Tadao Kasami, Shu Lin:
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11. IEEE Trans. Inf. Theory 32(5): 706-709 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 22:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint